Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published July 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Machine Learning Based Password Strength Analysis

  • 1. Assistant Professor, Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
  • 2. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
  • 3. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.

Contributors

Contact person:

  • 1. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.

Description

Abstract: Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passwords. This is cause of the similar patterns that users use to create a password, like dictionary words, common phrases, person and location names, keyboard pattern, and so on. Multiple password cracking techniques had been introduced to predict the password offline or online, with the majority of records say the one with weak password or familiar password patterns being cracked. This suggested prototype implements numerous machine learning methods such as Decision Tree (DT), Nave Bayes (NB), Logistic Regression (LR), and Random Forest (RF) on a web application in real time to force users to choose a secure password. This results in the user's account being logged into if particularly the password strength from more than half of the algorithms is strong.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

H91190711822.pdf

Files (431.0 kB)

Name Size Download all
md5:ab0fd09ebe41a3d0696d6b97d0aebb53
431.0 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • Grassi P.A., Garcia M., Fenton J. NIST Special Publication 800–63–3 Digital Identity Guidelines National Institute of Standards and Technology, Los Altos, CA (2020)
  • Zhou Huan, Liu Qixu, Cui Xiang, Zhang Fangjiao. Research on Targeted Password Guessing Using Neural Networks. Journal of Cyber Security. 2018. 3(5): p. 25-37.
  • M. Weir, S. Aggarwal, B. d. Medeiros and B. Glodek, "Password Cracking Using Probabilistic Context-Free Grammars," 2009 30th IEEE Symposium on Security and Privacy, Berkeley, CA, 2009, pp. 391-405, doi: 10.1109/SP.2009.8.
  • J. Blocki, B. Harsha and S. Zhou, "On the Economics of Offline Password Cracking," 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 853-871, doi: 10.1109/SP.2018.00009.
  • Melicher, W., et al., Better passwords through science (and neural networks). ; 2017. 42(4)
  • A LeCun, Y., Y. Bengio, and G. Hinton, Deep learning. Nature, 2015. 521(7553): pp. 436-444.
  • B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor, "How does your password measure up? The effect of strength meters on password creation," in Proceedings of the 21st USENIX conference on Security symposium, ser. USENIX-SS '12. USENIX Association, 2012, pp. 65–80.
  • S. J. Pan and Q. Yang, "A Survey on Transfer Learning," in IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, Oct. 2010, doi: 10.1109/TKDE.2009.191. Workshop (NSPW '05), pp. 67-72, Sept. 2005.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.H91190711822
https://www.ijitee.org/portfolio-item/h91190711822/
Journal Website: www.ijitee.org
https://www.ijitee.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/